Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings
Springer Science & Business Media, Jun 30, 2011 - Business & Economics - 309 pages
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
adversary agent algorithm Alice approach attacker attribute set authentication authorization rules Bloom filter Boolean browser CardSpace ciphertext client collaboration composed rule computation confidentiality constraints cyber-attack Dantzig-Wolfe Decomposition data mining database decomposition defined Definition delegation denote deny rule disjunct document DSMS efficient encryption entry ERMP evaluation Facebook fragmentation function given Heidelberg homomorphic encryption IEEE input K-LP problem LNCS login matrix mod q multiparty n-gram Nash equilibrium node OBDDs oblivious transfer operator trees optimal OSNs output outsourcing party password permission phase plaintext precomputation privacy-preserving proof proposed protocol PVSS quadratic residue Query Join Path query plan random require revocation RFID risk-tolerance roles scenario scheme Section security analyst Security and Privacy server smart card solution specific Springer storage Theorem truth assignments tuple user’s VANET variables verifier visibility constraints zero-knowledge proofs